{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T05:10:56Z","timestamp":1737090656525,"version":"3.33.0"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,18]],"date-time":"2024-09-18T00:00:00Z","timestamp":1726617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,18]]},"DOI":"10.1109\/ic3i61595.2024.10829135","type":"proceedings-article","created":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T19:34:30Z","timestamp":1736969670000},"page":"1365-1370","source":"Crossref","is-referenced-by-count":0,"title":["Advancing AI-Based Security Mechanisms for 5G Networks: Overcoming Privacy Concerns"],"prefix":"10.1109","author":[{"given":"Krishna","family":"Uprit","sequence":"first","affiliation":[{"name":"SVKM&#x2019;s NMIMS,School of Technology Management and Engineering (STME),Indore,India"}]},{"given":"Divya","family":"Gautam","sequence":"additional","affiliation":[{"name":"SVKM&#x2019;s NMIMS,School of Technology Management and Engineering (STME),Indore,India"}]},{"given":"Nidhi","family":"Asthana","sequence":"additional","affiliation":[{"name":"SVKM&#x2019;s NMIMS,School of Technology Management and Engineering (STME),Indore,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3105396"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1900271"},{"key":"ref3","article-title":"ai-in-anomaly-detection"},{"author":"Samarakoon","key":"ref4","article-title":"5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network"},{"key":"ref5","article-title":"ANOVA for Feature Selection in Machine Learning"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2023.01.249"},{"author":"Denoyer","key":"ref7","article-title":"Deep Sequential Neural Network"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3084827"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-022-10192-7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3272479"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2009.2021465"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/cec.2008.4630880"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2006.879347"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.30534\/ijeter\/2020\/55862020"},{"author":"Liu","key":"ref15","article-title":"An Improved Analysis of Stochastic Gradient Descent with Momentum"}],"event":{"name":"2024 7th International Conference on Contemporary Computing and Informatics (IC3I)","start":{"date-parts":[[2024,9,18]]},"location":"Greater Noida, India","end":{"date-parts":[[2024,9,20]]}},"container-title":["2024 7th International Conference on Contemporary Computing and Informatics (IC3I)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10828566\/10827843\/10829135.pdf?arnumber=10829135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T05:53:56Z","timestamp":1737006836000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10829135\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,18]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ic3i61595.2024.10829135","relation":{},"subject":[],"published":{"date-parts":[[2024,9,18]]}}}